Home
Services
Blogs
Privacy Policy
Applicant Privacy Policy
<< Back to all jobs
Head-Cyber Security
|
2023-11-17 04:56:15
Apply Now
Copy URL
15+ years of hard-core Security/Cybersecurity background.
Advanced Knowledge of Security Frameworks
: Familiarity with ISO 27001, NIST, and other cybersecurity frameworks.
Intrusion Detection and Prevention Systems (IDPS)
: Proficiency in setting up, managing, and interpreting IDPS.
Firewall Management
: Hands-on experience with firewall rules, policy management, and troubleshooting.
Cloud Security
: Expertise in securing cloud-based solutions like AWS, Azure, and Google Cloud.
Penetration Testing
: Ability to conduct and oversee penetration tests, including white-box and black-box approaches.
Security Information and Event Management (SIEM)
: Proficiency in SIEM tools like Splunk, ArcSight, or LogRhythm.
Endpoint Security
: Experience with endpoint protection platforms like Symantec, McAfee, or CrowdStrike.
Data Loss Prevention (DLP)
: Skills in implementing and managing DLP solutions to protect sensitive data.
Secure Software Development
: Familiarity with secure coding practices and software development life cycle (SDLC).
Cryptography
: Strong understanding of cryptographic protocols and secure communications.
Network Protocols
: Deep understanding of TCP/IP and other network protocols and the ability to analyze packet captures.
VPN Technologies
: Experience with VPNs, including site-to-site and remote access solutions.
Identity and Access Management (IAM)
: Expertise in IAM solutions like Okta, Azure AD, and LDAP.
Incident Response
: Demonstrated ability in managing incident response plans and activities.
Compliance and Regulations
: Understanding GDPR, CCPA, and other data protection regulations.
Threat Intelligence
: Ability to use threat intelligence platforms to inform security posture.
Scripting and Automation
: Proficiency in scripting languages like Python, Bash, or PowerShell for automating security tasks.
OSINT Techniques
: Skills in open-source intelligence gathering and analysis.
Vulnerability Management
: Experience in managing vulnerability assessment tools like Nessus or Qualys.
Mobile Security
: Understanding of securing mobile devices and applications.
Cybersecurity Awareness Training
: Ability to develop and deliver employee security training programs.
Not Ready to Apply?
Join our talent pool and we'll reach out when a job fits your skills.